<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>drupalgeddon2 Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/drupalgeddon2/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Thu, 21 Jun 2018 20:43:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>Drupalgeddon2 is The Next Target of Hackers</title>
		<link>https://www.osradar.com/drupalgeddon2-is-the-next-target-of-hackers/</link>
					<comments>https://www.osradar.com/drupalgeddon2-is-the-next-target-of-hackers/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Sat, 21 Apr 2018 06:14:53 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[drupal]]></category>
		<category><![CDATA[drupal patch]]></category>
		<category><![CDATA[drupalgeddon]]></category>
		<category><![CDATA[drupalgeddon2]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=2690</guid>

					<description><![CDATA[<p>Drupal is one of the best CMS for web admins. It’s free, open-source and powerful to perform lots of critical tasks. There are tons of websites that use Drupal as their CMS. Recently, Drupal released patches for a vulnerability in its system known as Drupalgeddon2. It’ll take some time before all the websites are updated [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/drupalgeddon2-is-the-next-target-of-hackers/">Drupalgeddon2 is The Next Target of Hackers</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Drupal is one of the best CMS for web admins. It’s free, open-source and powerful to perform lots of critical tasks. There are tons of websites that use Drupal as their CMS. Recently, Drupal released patches for a vulnerability in its system known as Drupalgeddon2. It’ll take some time before all the websites are updated to the latest version. Some might even won’t care about upgrading their software. Hackers are taking this opportunity to exploit and use the unpatched systems for themselves.</p>
<p>Very recently, a botnet has started severe exploitation of the Drupalgeddon2 on a large scale. The botnet consists of servers and smart devices. It also acts more like a worm. For your reminder, Drupalgeddon2 is a vulnerability that can allow running codes on the website from the URL. <a href="https://www.osradar.com/drupal-fixes-drupalgeddon2-no-more-taking-over-websites/">Learn more about Drupalgeddon2</a>.</p>
<h3>Botnet attacking Drupal sites</h3>
<p>Security researchers from Qihoo 360 Netlab and GreyNoise Intelligence have been keeping a sharp look on the botnet. They spotted the shift of the botnet’s target from other vulnerabilities to Drupalgeddon2. The shift took place at the starting of this week. Netlab team named the botnet as Mushtik as the botnet uses the name in many of its payloads.</p>
<p>Mushtik is developed on top of a really old malware strain Tsunami that’s being used for years for creating botnets to infect Linux servers and other Linux-based systems. The hacker(s) initially used Tsunami for DDoS attacks, but thanks to its feature set, they’ve shifted towards exploiting known vulnerabilities.</p>
<p>According to the security researchers, the Tsunami in Mushtik can install XMRig Monero miner, CGMiner or launch a DDoS attack from the infected hosts. Using these 3 payloads, the crooks are making money for themselves (illegally).</p>
<h3>Infected hosts act as a worm</h3>
<p>Researchers also added that besides using those 3 payloads, the infected sites also start searching for other sites to find more targets to exploit. That’s performed by a scanning module downloaded by the malware.</p>
<p>The module contacts with a list of different control and command servers to get a list of IP addresses for scanning. It scans the IP addresses on pre-defined ports to identify the systems. After identifying the next potential target, it contacts with the main Mushtik C&amp;C servers about the next target.</p>
<p>This type of behavior is quite common as IoT botnets at the present days. However, Mushtik is the first known one that’s using Drupalgeddon2 in its arsenal. According to GreyNoise, this malware is also actively targeting Oracle WebLogic systems.</p>
<blockquote class="twitter-tweet" data-lang="en">
<p dir="ltr" lang="en">GreyNoise has detected a sharp increase in opportunistic exploitation of Oracle WebLogic Server, specifically CVE-2017-10271.</p>
<p>~1,200 devices have suddenly started broadly exploiting this vulnerability by issuing exploit requests to the &#8220;/wls-wsat/CoordinatorPortType&#8221; URL.</p>
<p>— GreyNoise Intelligence (@GreyNoiseIO) <a href="https://twitter.com/GreyNoiseIO/status/986453659524399104?ref_src=twsrc%5Etfw">April 18, 2018</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<h3>How to stay secured</h3>
<p>For staying secured, web admins are strongly recommended to upgrade the software of their websites as soon as possible. Drupal released urgent patches for both of their product lines – v7.58 and v8.5.1. Once infected, you may at a severe loss. So, patch your system while there’s still time.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/drupalgeddon2-is-the-next-target-of-hackers/">Drupalgeddon2 is The Next Target of Hackers</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/drupalgeddon2-is-the-next-target-of-hackers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Drupal Fixes Drupalgeddon2 – No More Taking Over Websites</title>
		<link>https://www.osradar.com/drupal-fixes-drupalgeddon2-no-more-taking-over-websites/</link>
					<comments>https://www.osradar.com/drupal-fixes-drupalgeddon2-no-more-taking-over-websites/#comments</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Thu, 29 Mar 2018 04:48:27 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[drupal]]></category>
		<category><![CDATA[drupal patch]]></category>
		<category><![CDATA[drupalgeddon2]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=2327</guid>

					<description><![CDATA[<p>In the web sector, CMS (Content Management System) is the most popular solution for creating a top-notch website and manage it faster and efficiently. Drupal is one of the most popular and powerful CMS solutions for website devs and managers. It offers tons of versatility and flexibility. However, there existed a serious bug in the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/drupal-fixes-drupalgeddon2-no-more-taking-over-websites/">Drupal Fixes Drupalgeddon2 – No More Taking Over Websites</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In the web sector, CMS (Content Management System) is the most popular solution for creating a top-notch website and manage it faster and efficiently. Drupal is one of the most popular and powerful CMS solutions for website devs and managers. It offers tons of versatility and flexibility. However, there existed a serious bug in the code of Drupal, named “Drupalgeddon2”. If a hacker could successfully exploit it, he could take over the website!</p>
<p>Drupal has released a patch for this severe bug. For every Drupal site owner, it’s mandatory to update their software immediately, meaning right now. The latest Drupal version is 8.5.1. Update as soon as possible. The flaw is so severe that Drupal assigned a security score of 21 out of 25!</p>
<h3>Drupal’s unauthenticated RCE flaw</h3>
<p>The bug was identified very recently, under the identifier <a href="https://groups.drupal.org/security/faq-2018-002">CVE-2018-7600</a>. Using this bug, a hacker could execute any code inside the website, despite against the CMS’ core components. Thus, he could successfully take over the website.</p>
<p>Moreover, the bug was easier to exploit. The hacker didn’t have to register/authenticate on the sites to take it over. All he needed was to access an URL.</p>
<p>Drupal credits Jasper Mattsson, a Drupal security auditing firm Druid employee for identifying this bug in the software.</p>
<p>Although it’s not so severe as Drupalgeddon (<a href="https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2014-10-15/sa-core-2014-005-drupal-core-sql">CVE-2014-3704</a>, severity score 25/25), the community nicknamed the latest one with Drupalgeddon2.</p>
<h3>No proof-of-concept, no attacks detected (yet)</h3>
<p>Although the bug was quite severe, there’s no proof-of-concept code available anywhere on the internet. Moreover, there has been no report found where this bug was exploited to take over the website. With the latest patches released, security researchers are digging up the code to see what’s patched up.</p>
<p>However, because of the public disclosure about the bug, Drupal team anticipates that within days, we could see the attempts to exploit this bug on unpatched systems.</p>
<p>Note that Drupal v6.x and v7.x are also infected with the bug. Drupal released individual updates for each of the versions, where v6.x was discontinued in February 2016.</p>
<h3>What to do now</h3>
<p>If you’re an admin of Drupal website, update your website to the latest edition. If it’s quite difficult to apply the patches with the running website, switch to a temporary HTML edition of your website so that you won’t have to suffer the damage.</p>
<p>Patching must not be ignored. For example, when Drupal’s official website patched their system for Drupalgeddon2, the site was down for around half an hour.</p>
<p>Drupal currently powers around 1 million websites on the internet with the market share of 9%.</p>
<p>For Facebook users, it&#8217;s quite important to secure their data. <a href="https://www.osradar.com/how-to-protect-your-information-on-facebook/">Learn how to secure your FB information</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/drupal-fixes-drupalgeddon2-no-more-taking-over-websites/">Drupal Fixes Drupalgeddon2 – No More Taking Over Websites</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/drupal-fixes-drupalgeddon2-no-more-taking-over-websites/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
